Block cipher/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Chris Day |
imported>Chris Day |
||
Line 18: | Line 18: | ||
{{r|Linearity (cryptography)}}. A general discussion of nonlinearity would be part of this. | {{r|Linearity (cryptography)}}. A general discussion of nonlinearity would be part of this. | ||
{{r|Key (cryptography)}} | {{r|Key (cryptography)}} | ||
{{r|Key management (cryptography}} | {{r|Key management (cryptography)}} | ||
{{r|Stream cipher}} | {{r|Stream cipher}} |
Revision as of 01:11, 2 November 2008
- See also changes related to Block cipher, or pages that link to Block cipher or to this page or whose text contains "Block cipher".
Parent topics
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
Subtopics
- Advanced Encryption Standard [r]: A US government standard issued in 2002 for a stronger block cipher to succeed the earlier Data Encryption Standard. [e]
- Avalanche (cryptography) [r]: A desirable property for operations in a cipher or hash, where a small change (even a single bit) quickly builds up to creating large effects. [e]
- Data Encryption Standard [r]: A block cipher specification issued by the U.S. government in 1976, intended for sensitive but unclassified data. It is now obsolescent, succeeded by the Advanced Encryption Standard, but still used in commercial systems. [e]
- Round (cryptography) [r]: A relatively simple operation which, when repeated many times, can be used to build an iterated cipher or hash. [e]
- S-box (cryptography) [r]: A substitution box or lookup table. [e]
- Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
- Hash (cryptography) [r]: An algorithm that produces a fixed-size digest from an input of essentially arbitrary size. [e]
- Linearity (cryptography) [r]: Add brief definition or description. A general discussion of nonlinearity would be part of this.
- Key (cryptography) [r]: Characteristics and generation of data which, in combination with a cryptographic algorithm, introduces or removes the concealment applied to plaintext or taken to ciphertext; key management is arelated but separate discipline of secure distribution of keys and entering them into cryptosystems [e]
- Key management (cryptography) [r]: Add brief definition or description
- Stream cipher [r]: A cipher that encrypts data by mixing it with the output of a pseudorandom number generator controlled by a key; to decrypt, run the same generator with the same key to get the same pseudorandom data, then reverse the mixing step. [e]